Critical Infrastructure


Protection Beyond Fences - Early warning detection and identification of threats inside and outside the fence line

Protection Beyond Fences

Recent terrorist attacks on substations and the potential for simultaneous attacks across the United States put the entire country at serious risk for major power interruption.

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

The survey was conducted by the Pew Research Center.

The Largest Mass Transit Deployment

Helping the Chicago Transit Authority (CTA) reduce violent crime and robberies by up to 35 percent was a mission Sentry 360 relished. Providing their Ultra HD surveillance cameras and systems, the Plainfield, Ill., camera manufacturer was involved in the largest 360-degree install in mass transit history.

G4S Technology Chosen to Deploy Second Phase of Critical Infrastructure

Ongoing technology partnership between Iberdrola USA and G4S Technology continues to transform physical security for the energy and utility industry.

The Rise of the Machines: M2M’s Role in Transforming Business and Security

The Rise of the Machines: M2M’s Role in Transforming Business and Security

Faced with tighter security requirements, enhanced regulatory pressure and heightened environmental concerns, businesses seek technologies that will improve overall business processes.

Amazon Boosts Privacy Law Compliance with New Frankfurt Data Center

Amazon Boosts Privacy Law Compliance with New Frankfurt Data Center

The AWS data center hopes to help German businesses move to the cloud.

Altronix Launches Video Series on Infrastructure Solutions

Informative videos deliver overviews on new innovative products.

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system.



Security Within Reach

Since the aftermath of 9/11, the United States has intensified transportation security efforts across the board. For most of us, stronger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols.

Highlighting the Hotsheet: 2nd Quarter Cargo Theft Update

Highlighting the Hotsheet: 2nd Quarter Cargo Theft Update

DHS identified transportation systems as one of 16 critical infrastructures to nation's supply chain and cargo theft as a constant threat to stability.

The Home Depot Hack was Easy

The Home Depot Hack was Easy

Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack

How to Get the Most Out of Your Video Surveillance Investment

Transit systems across the country strive to make the smartest investments to improve community safety and provide valuable resources for law enforcement.

Columnist calls for public security cameras after the disturbances in Ferguson

Columnist calls for public security cameras after the disturbances in Ferguson

Larry Seltzer says that public security cameras could have helped the police gather information

Energy Distribution

Energy Distribution

When officials at the United Illuminating Co., a regional energy distribution company in New Haven, Conn., planned the recent completion of their 56-acre corporate headquarters, their “must-have” list included a campus-wide Emergency Communications System (ECS).

White Flags Fly from Brooklyn Bridge in Security Breach

White Flags Fly from Brooklyn Bridge in Security Breach

The American flags that sit atop the bridge were replaced by white flags.

Protect Critical Infrastructure With Advanced Identity Management Solutions

Protect Critical Infrastructure With Advanced Identity Management Solutions

Huge component in protecting critical infrastructure from being high-risk terrorist targets is by properly managing the identities of those getting into and out of secured zones.

Improving transit system safety with integrated security solutions

On the Move

According to data from the American Public Transportation Association, riders took a staggering 10.7 billion trips on public transportation in 2013, marking the eighth year in row that more than 10 billion trips were taken on public transportation systems nationwide.

Regulations and money are all part of maritime security

Bringing Mixed Results

According to the U.S. Coast Guard, there are 361 major ports with port authorities as the others are governed by various state and local public entities, portnavigation districts and municipal port departments.

Comprehensive ICE Cable Systems Catalog Helps Dealers Make More Informed Buying Decisions

Available in webzine and PDF formats, this 34-page catalog provides detailed overview of the company’s products and strong adherence to safety and performance standards including UL, ETL, RoHS and HDBaseT.

Confronting Evolving Challenges

Confronting Evolving Challenges

Karen Churchill from Synectics explains how evolving surveillance integration capabilities can help improve critical national infrastructure protection during challenging economic times.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3